First published: Tue Nov 13 2018(Updated: )
In libwpd 0.10.2, there is a NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp that will lead to a denial of service attack. This is related to WPXTable.h. References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED DUPLICATE - [fix available] There is a illegal address access at function WP6ContentListener::defineTable in software libwpd." href="show_bug.cgi?id=1643752">https://bugzilla.redhat.com/show_bug.cgi?id=1643752</a> <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19208">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-19208</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Libwpd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1649414 is classified as high due to the denial of service vulnerability.
REDHAT-BUG-1649414 exploits a NULL pointer dereference within the WP6ContentListener::defineTable function.
The vulnerability REDHAT-BUG-1649414 affects libwpd version 0.10.2.
To mitigate the risk of REDHAT-BUG-1649414, it is recommended to upgrade to a patched version of libwpd.
REDHAT-BUG-1649414 can lead to a denial of service attack, causing the application to crash.